咨询与建议

限定检索结果

文献类型

  • 1,917 篇 期刊文献
  • 1,799 篇 会议
  • 1 册 图书

馆藏范围

  • 3,717 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,598 篇 工学
    • 1,779 篇 计算机科学与技术...
    • 1,389 篇 软件工程
    • 616 篇 信息与通信工程
    • 372 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 192 篇 机械工程
    • 151 篇 网络空间安全
    • 138 篇 光学工程
    • 133 篇 生物医学工程(可授...
    • 126 篇 仪器科学与技术
    • 107 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 70 篇 建筑学
    • 64 篇 土木工程
    • 64 篇 化学工程与技术
  • 1,268 篇 理学
    • 684 篇 数学
    • 342 篇 物理学
    • 249 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 646 篇 管理学
    • 415 篇 管理科学与工程(可...
    • 256 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 133 篇 医学
    • 117 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 29 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 87 篇 feature extracti...
  • 69 篇 federated learni...
  • 68 篇 semantics
  • 64 篇 security
  • 62 篇 computational mo...
  • 61 篇 cryptography
  • 59 篇 optimization
  • 58 篇 training
  • 57 篇 deep learning
  • 57 篇 accuracy
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 51 篇 privacy
  • 47 篇 authentication
  • 39 篇 data models
  • 38 篇 servers
  • 37 篇 data mining
  • 37 篇 protocols
  • 37 篇 robustness

机构

  • 147 篇 department of co...
  • 75 篇 key laboratory o...
  • 74 篇 national key lab...
  • 67 篇 school of softwa...
  • 58 篇 shandong provinc...
  • 56 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 43 篇 school of comput...
  • 43 篇 hubei province k...
  • 38 篇 state key labora...
  • 36 篇 university of ch...
  • 36 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 peng cheng labor...
  • 32 篇 department of el...
  • 31 篇 key laboratory f...
  • 30 篇 state key labora...
  • 30 篇 school of cyber ...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 yang yang
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 xiaoming wu
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,217 篇 英文
  • 407 篇 其他
  • 102 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3717 条 记 录,以下是1031-1040 订阅
排序:
Size-invariance matters: rethinking metrics and losses for imbalanced multi-object salient object detection  24
Size-invariance matters: rethinking metrics and losses for i...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Feiran Li Qianqian Xu Shilong Bao Zhiyong Yang Runmin Cong Xiaochun Cao Qingming Huang Institute of Information Engineering Chinese Academy of Sciences Beijing China and School of Cyber Security University of Chinese Academy of Sciences Beijing China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China Institute of Information Science Beijing Jiaotong University Beijing China and School of Control Science and Engineering Shandong University Jinan China and Key Laboratory of Machine Intelligence and System Control Ministry of Education Jinan China School of Cyber Science and Tech. Shenzhen Campus Sun Yat-sen University School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China and Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China and Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing China
This paper explores the size-invariance of evaluation metrics in Salient Object Detection (SOD), especially when multiple targets of diverse sizes co-exist in the same image. We observe that current metrics are size-s...
来源: 评论
Adversarial Attacks on Deep Neural Networks for Time Series Prediction  10
Adversarial Attacks on Deep Neural Networks for Time Series ...
收藏 引用
10th International Conference on Internet Computing for science and Engineering, ICICSE 2021
作者: Xu, Aidong Wang, Xuechun Zhang, Yunan Wu, Tao Xian, Xingping Guangdong Provincial Key Laboratory of Power System Network Security Electric Power Research Institute CSG China School of Computer Science and Technology Chongqing University of Posts and Telecommunications China School of Cybersecurity and Information Law Chongqing University of Posts and Telecommunications China
Time series data is widespread in real-world scenarios. To recover and infer missing information in practical domains, such as stock price monitoring, electricity load forecasting, traffic flows analysis, climate tren... 详细信息
来源: 评论
SRoUDA: Meta Self-training for Robust Unsupervised Domain Adaptation
arXiv
收藏 引用
arXiv 2022年
作者: Zhu, Wanqing Yin, Jia-Li Chen, Bo-Hao Liu, Ximeng Fujian Province Key Laboratory of Information Security of Network System Fuzhou350108 China College of Computer Science and Big Data Fuzhou University Fuzhou350108 China Department of Computer Science and Engineering Yuan Ze University Taiwan
As acquiring manual labels on data could be costly, unsupervised domain adaptation (UDA), which transfers knowledge learned from a rich-label dataset to the unlabeled target dataset, is gaining increasing popularity. ... 详细信息
来源: 评论
A homogenization method for nonlinear inhomogeneous elastic materials
收藏 引用
Virtual Reality & Intelligent Hardware 2021年 第2期3卷 156-170页
作者: Jing ZHAO Fei ZHU Liyou XU Yong TANG Sheng LI College of Information Science and Engineering Yanshan UniversityQinhuangdaoHebei 066004China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province QinhuangdaoHebei 066004China School of Electronics Engineering and Computer Science Peking UniversityBeijing 100871China Beijing Engineering Research Center for Virtual Simulation and Visualization Beijing 100871China
Background Fast simulation techniques are strongly favored in computer graphics,especially for the nonlinear inhomogeneous elastic *** homogenization theory is a perfect match to simulate inhomogeneous deformable obje... 详细信息
来源: 评论
Reliability Evaluation and Improvement of Islanded Microgrid Considering Operation Failures of Power Electronic Equipment
收藏 引用
Journal of Modern Power systems and Clean Energy 2020年 第1期8卷 111-123页
作者: Wen Zhong Lingfeng Wang Zhaoxi Liu Shiying Hou State Key Laboratory of Power Transmission Equipment&System Security and New Technology College of Electrical EngineeringChongqing UniversityChongqingChina Laboratory of Trustworthy Cyber-Physical Systems and Infrastructures Department of Electrical Engineering and Computer ScienceUniversity of Wisconsin-MilwaukeeMilwaukeeUSA
With the high integration of power electronic technologies in microgrids,the reliability assessment considering power electronic devices has become a hot ***,so far no research has considered the impact of the operati... 详细信息
来源: 评论
SAMOC: Enabling Atomic Invocations for Cross-chain Crowdsourcing Testing DApps in Industrial Control Through Trusted Smart Community and Lock Mechanism
SAMOC: Enabling Atomic Invocations for Cross-chain Crowdsour...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Weiguo Huang Yong Ding Jun Li Yujue Wang Hai Liang Changsong Yang Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Guangxi Engineering Research Center of Industrial Internet Security and Blockchain Guilin University of Electronic Technology Guilin China Lion Rock Labs of Cyberspace Security Institute of Cyberspace Technology HKCT Institute for Higher Education China China Industrial Control Systems Cyber Emergency Response Team Beijing China Hangzhou Innovation Institute of Beihang University Hangzhou China
Crowdsourcing testing leverages extensive user participation to identify and fix potential issues in industrial control software, ensuring its security and reliability. Decentralized applications (DApps) can utilize b... 详细信息
来源: 评论
Improving GNSS positioning correction using Deep Reinforcement Learning with Adaptive Reward Augmentation Method  36
Improving GNSS positioning correction using Deep Reinforceme...
收藏 引用
36th International Technical Meeting of the Satellite Division of the Institute of Navigation, ION GNSS+ 2023
作者: Tang, Jianhao Li, Zhenni Guo, Rui Zhao, Haoli Wang, Qianming Liu, Ming Xie, Shengli Polycarpou, Marios School of Automation Guangdong University of Technology Guangzhou510006 China Guangdong-HongKong-Macao Joint Laboratory for Smart Discrete Manufacturing Guangzhou510006 China Techtotop Microelectronics Technology Co. Ltd. Guangzhou510006 China Department of Electronic and Computer Engineering Hong Kong University of Science and Technology Hong Kong Key Laboratory of Intelligent Detection and The Internet of Things in Manufacturing Guangzhou510006 China Guangdong Key Laboratory of IoT Information Technology Guangzhou510006 China KIOS Research and Innovation Center of Excellence University of Cyprus Nicosia Cyprus
High-precision global navigation satellite system (GNSS) positioning for automatic driving in urban environments is an unsolved problem because of the influence of multipath effects. Recently, methods based on data-dr...
来源: 评论
SAMOC: Enabling Atomic Invocations for Cross-chain Crowdsourcing Testing DApps in Industrial Control Through Trusted Smart Community and Lock Mechanism  23
SAMOC: Enabling Atomic Invocations for Cross-chain Crowdsour...
收藏 引用
23rd IEEE International Conference on Trust, security and Privacy in Computing and Communications, TrustCom 2024
作者: Huang, Weiguo Ding, Yong Li, Jun Wang, Yujue Liang, Hai Yang, Changsong Guilin University of Electronic Technology Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin China Hkct Institute for Higher Education Lion Rock Labs of Cyberspace Security Institute of Cyberspace Technology 999077 China Guilin University of Electronic Technology Guangxi Engineering Research Center of Industrial Internet Security and Blockchain Guilin China China Industrial Control Systems Cyber Emergency Response Team Beijing China Hangzhou Innovation Institute of Beihang University Hangzhou China
Crowdsourcing testing leverages extensive user participation to identify and fix potential issues in industrial control software, ensuring its security and reliability. Decentralized applications (DApps) can utilize b... 详细信息
来源: 评论
Sequential generation of self-starting diverse operations in all-fiber laser based on thulium-doped fiber saturable absorber
收藏 引用
Chinese Physics B 2022年 第6期31卷 87-90页
作者: Pei Zhang Kaharudin Dimyati Bilal Nizamani Mustafa M.Najm S.W.Harun School of Electrical and Information Engineering Huaihua UniversityHuaihua 418008China Key Laboratory of Intelligent Control Technology for Wuling-Mountain Ecological Agriculture in Hunan Province Huaihua UniversityHuaihua 418008China Department of Electrical Engineering Faculty of EngineeringUniversity of MalayaKuala Lumpur 50603Malaysia Faculty of Advanced Technology and Multidiscipline Airlangga UniversitySurabaya 60115Indonesia Institute of Computer Science and Digital Innovation UCSI UniversityKuala LumpurMalaysia
Self-starting Q-switching,Q-switched mode-locking and mode-locking operation modes are achieved sequentially in an all-fiber erbium-doped fiber laser with thulium-doped fiber saturable absorber for the first *** centr... 详细信息
来源: 评论
A New and Efficient IT Knowledge Exchange Platform  2nd
A New and Efficient IT Knowledge Exchange Platform
收藏 引用
2nd International Conference on Applied Intelligence, ICAI 2024
作者: Sha, Jinting Yu, Wendong Wei, Hongwei Yuan, Lin Li, Zhujun Shandong Jinan250353 China Shandong Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Shandong Jinan250353 China Shandong Tianyi Information Technology Co. Ltd. Shandong Jinan250101 China Jinan Springs Patent and Trademark Office Shandong Jinan250014 China
As information technology continues to advance, an increasing number of technicians are joining the IT field. However, the technology in this field is changing very rapidly, requiring many technicians to constantly le... 详细信息
来源: 评论